Strengthening Digital Signatures Via Randomized Hashing
From MaRDI portal
Publication:5756648
DOI10.1007/11818175_3zbMath1161.94443OpenAlexW1512933114WikidataQ28016063 ScholiaQ28016063MaRDI QIDQ5756648
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_3
Related Items (22)
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness ⋮ Improved indifferentiability security bound for the JH mode ⋮ Higher order eTCR hash functions ⋮ New second-preimage attacks on hash functions ⋮ PKP-based signature scheme ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Open problems in hash function security ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ The Hash Function Family LAKE ⋮ Surnaming Schemes, Fast Verification, and Applications to SGX Technology ⋮ Digital Signatures Out of Second-Preimage Resistant Hash Functions ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ Security of Digital Signature Schemes in Weakened Random Oracle Models ⋮ On Randomizing Hash Functions to Strengthen the Security of Digital Signatures ⋮ Hash function requirements for Schnorr signatures ⋮ Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders ⋮ A Three-Property-Secure Hash Function ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL ⋮ Delayed-Key Message Authentication for Streams
This page was built for publication: Strengthening Digital Signatures Via Randomized Hashing